[Forgot Password]
Login  Register Subscribe

24128

 
 

131573

 
 

110139

 
 

909

 
 

85964

 
 

136

Paid content will be excluded from the download.


Download | Alert*
OVAL

Disable: 'User Account Control: Virtualize file and registry write failures to per-user locations'

ID: oval:org.secpod.oval:def:35196Date: (C)2016-06-10   (M)2018-07-10
Class: COMPLIANCEFamily: windows




This policy setting controls whether application write failures are redirected to defined registry and file system locations. This policy setting mitigates applications that run as administrator and write run-time application data to %ProgramFiles%, %Windir%, %Windir%\system32, or HKLM\Software. The options are: - Enabled: (Default) Application write failures are redirected at run time to defined user locations for both the file system and registry. - Disabled: Applications that write data to protected locations fail.

Platform:
Microsoft Windows 10
Reference:
CCE-42858-1
CCE    1
CCE-42858-1
XCCDF    5
xccdf_org.secpod_benchmark_general_Windows_10
xccdf_org.secpod_benchmark_HIPAA_45CFR_164_Windows_10
xccdf_org.secpod_benchmark_NIST_800_171_R1_Windows_10
xccdf_org.secpod_benchmark_NIST_800_53_r4_Windows_10
...

© SecPod Technologies